General
-
Target
cce58dc44c0ee7d4108c75a3fd8370fe949b408436bc81adb210be528d2f6a33.elf
-
Size
82KB
-
Sample
240220-gqwa1sda85
-
MD5
7ba1fa476db0f7533df01e75a96cd27b
-
SHA1
338593961160fb1d5a9571c492ed5b2a1e253b6d
-
SHA256
cce58dc44c0ee7d4108c75a3fd8370fe949b408436bc81adb210be528d2f6a33
-
SHA512
3658f547a55b3528ef5d4681d6c199861f4dced5d518ed5ee2745675b1cadc4e535be27ca033037346d79e98ca4595d53ba7b1fc51c7667f0358a83fff120001
-
SSDEEP
1536:iVLyeFRKvvkj752dCexuV/8UZlDwfkJ4MYfWC:iVLyU4yFezxu5VD1er
Behavioral task
behavioral1
Sample
cce58dc44c0ee7d4108c75a3fd8370fe949b408436bc81adb210be528d2f6a33.elf
Resource
debian9-mipsel-20231215-en
Malware Config
Extracted
mirai
botnet.layer4.bf
Targets
-
-
Target
cce58dc44c0ee7d4108c75a3fd8370fe949b408436bc81adb210be528d2f6a33.elf
-
Size
82KB
-
MD5
7ba1fa476db0f7533df01e75a96cd27b
-
SHA1
338593961160fb1d5a9571c492ed5b2a1e253b6d
-
SHA256
cce58dc44c0ee7d4108c75a3fd8370fe949b408436bc81adb210be528d2f6a33
-
SHA512
3658f547a55b3528ef5d4681d6c199861f4dced5d518ed5ee2745675b1cadc4e535be27ca033037346d79e98ca4595d53ba7b1fc51c7667f0358a83fff120001
-
SSDEEP
1536:iVLyeFRKvvkj752dCexuV/8UZlDwfkJ4MYfWC:iVLyU4yFezxu5VD1er
Score9/10-
Contacts a large (35063) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Enumerates running processes
Discovers information about currently running processes on the system
-